Providing Policy-Neutral and Transparent Access Control in Extensible Systems
- 1 January 1999
- book chapter
- Published by Springer Nature
- p. 317-338
- https://doi.org/10.1007/3-540-48749-2_15
Abstract
No abstract availableKeywords
This publication has 27 references indexed in Scilit:
- The Chinese Wall security policyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Java security: from HotJava to Netscape and beyondPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Practical Domain and Type Enforcement for UNIXPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A protection scheme for mobile agents on JavaPublished by Association for Computing Machinery (ACM) ,1997
- Java security: present and near futureIEEE Micro, 1997
- Extensibility safety and performance in the SPIN operating systemPublished by Association for Computing Machinery (ACM) ,1995
- Authentication in distributed systemsACM Transactions on Computer Systems, 1992
- A Comparison of Commercial and Military Computer Security PoliciesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- A lattice model of secure information flowCommunications of the ACM, 1976
- ProtectionACM SIGOPS Operating Systems Review, 1974